2014-12-30 17:22:31 -05:00
// +build !test_no_exec
2014-09-18 17:36:34 -04:00
package main
import (
"bufio"
2018-04-19 18:30:59 -04:00
"context"
2015-01-15 13:37:30 -05:00
"fmt"
2014-11-05 18:12:24 -05:00
"os"
2014-09-18 17:36:34 -04:00
"os/exec"
2015-01-15 13:37:30 -05:00
"reflect"
2016-05-25 13:19:17 -04:00
"runtime"
2015-01-15 13:37:30 -05:00
"sort"
2018-08-20 22:05:46 -04:00
"strconv"
2014-09-18 17:36:34 -04:00
"strings"
2015-01-15 13:37:30 -05:00
"sync"
2014-09-18 17:36:34 -04:00
"time"
2015-04-18 12:46:47 -04:00
2017-05-23 23:56:26 -04:00
"github.com/docker/docker/client"
2017-04-11 15:18:30 -04:00
"github.com/docker/docker/integration-cli/cli"
2017-03-23 13:35:22 -04:00
"github.com/docker/docker/integration-cli/cli/build"
2018-08-20 22:05:46 -04:00
"github.com/docker/docker/pkg/parsers/kernel"
2015-04-18 12:46:47 -04:00
"github.com/go-check/check"
2019-04-04 09:23:19 -04:00
"gotest.tools/assert"
is "gotest.tools/assert/cmp"
2018-06-11 09:32:11 -04:00
"gotest.tools/icmd"
2014-09-18 17:36:34 -04:00
)
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestExec ( c * check . C ) {
2015-08-28 13:36:42 -04:00
testRequires ( c , DaemonIsLinux )
2016-02-23 12:46:13 -05:00
out , _ := dockerCmd ( c , "run" , "-d" , "--name" , "testing" , "busybox" , "sh" , "-c" , "echo test > /tmp/file && top" )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , waitRun ( strings . TrimSpace ( out ) ) )
2015-02-20 01:56:02 -05:00
2016-02-23 12:46:13 -05:00
out , _ = dockerCmd ( c , "exec" , "testing" , "cat" , "/tmp/file" )
2019-04-04 09:23:19 -04:00
assert . Equal ( c , strings . Trim ( out , "\r\n" ) , "test" )
2014-09-18 17:36:34 -04:00
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestExecInteractive ( c * check . C ) {
2015-08-28 13:36:42 -04:00
testRequires ( c , DaemonIsLinux )
2015-07-20 02:55:40 -04:00
dockerCmd ( c , "run" , "-d" , "--name" , "testing" , "busybox" , "sh" , "-c" , "echo test > /tmp/file && top" )
2014-09-18 17:36:34 -04:00
execCmd := exec . Command ( dockerBinary , "exec" , "-i" , "testing" , "sh" )
stdin , err := execCmd . StdinPipe ( )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2014-09-18 17:36:34 -04:00
stdout , err := execCmd . StdoutPipe ( )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2014-09-18 17:36:34 -04:00
2015-10-21 19:58:19 -04:00
err = execCmd . Start ( )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2015-10-21 19:58:19 -04:00
_ , err = stdin . Write ( [ ] byte ( "cat /tmp/file\n" ) )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2014-09-18 17:36:34 -04:00
r := bufio . NewReader ( stdout )
line , err := r . ReadString ( '\n' )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2014-09-18 17:36:34 -04:00
line = strings . TrimSpace ( line )
2019-04-04 09:23:19 -04:00
assert . Equal ( c , line , "test" )
2015-10-21 19:58:19 -04:00
err = stdin . Close ( )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2015-04-27 13:29:48 -04:00
errChan := make ( chan error )
2014-09-18 17:36:34 -04:00
go func ( ) {
2015-04-27 13:29:48 -04:00
errChan <- execCmd . Wait ( )
close ( errChan )
2014-09-18 17:36:34 -04:00
} ( )
select {
2015-04-27 13:29:48 -04:00
case err := <- errChan :
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2014-09-18 17:36:34 -04:00
case <- time . After ( 1 * time . Second ) :
2015-04-18 12:46:47 -04:00
c . Fatal ( "docker exec failed to exit on stdin close" )
2014-09-18 17:36:34 -04:00
}
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestExecAfterContainerRestart ( c * check . C ) {
2017-04-16 17:39:30 -04:00
out := runSleepingContainer ( c )
2015-04-06 09:21:18 -04:00
cleanedContainerID := strings . TrimSpace ( out )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , waitRun ( cleanedContainerID ) )
2015-07-20 02:55:40 -04:00
dockerCmd ( c , "restart" , cleanedContainerID )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , waitRun ( cleanedContainerID ) )
2014-09-18 17:36:34 -04:00
2015-07-20 02:55:40 -04:00
out , _ = dockerCmd ( c , "exec" , cleanedContainerID , "echo" , "hello" )
2019-04-04 09:23:19 -04:00
assert . Equal ( c , strings . TrimSpace ( out ) , "hello" )
2014-09-18 17:36:34 -04:00
}
2015-04-25 22:47:42 -04:00
func ( s * DockerDaemonSuite ) TestExecAfterDaemonRestart ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// TODO Windows CI: Requires a little work to get this ported.
2018-12-24 07:25:53 -05:00
testRequires ( c , DaemonIsLinux , testEnv . IsLocalDaemon )
2016-12-09 17:20:14 -05:00
s . d . StartWithBusybox ( c )
2014-09-18 17:36:34 -04:00
2015-10-21 19:58:19 -04:00
out , err := s . d . Cmd ( "run" , "-d" , "--name" , "top" , "-p" , "80" , "busybox:latest" , "top" )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err , "Could not run top: %s" , out )
2014-09-18 17:36:34 -04:00
2016-12-09 17:20:14 -05:00
s . d . Restart ( c )
2014-09-18 17:36:34 -04:00
2015-10-21 19:58:19 -04:00
out , err = s . d . Cmd ( "start" , "top" )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err , "Could not start top after daemon restart: %s" , out )
2014-09-18 17:36:34 -04:00
2015-10-21 19:58:19 -04:00
out , err = s . d . Cmd ( "exec" , "top" , "echo" , "hello" )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err , "Could not exec on container top: %s" , out )
assert . Equal ( c , strings . TrimSpace ( out ) , "hello" )
2014-09-18 17:36:34 -04:00
}
2014-11-14 12:37:04 -05:00
2015-03-13 05:12:02 -04:00
// Regression test for #9155, #9044
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestExecEnv ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// TODO Windows CI: This one is interesting and may just end up being a feature
// difference between Windows and Linux. On Windows, the environment is passed
// into the process that is launched, not into the machine environment. Hence
// a subsequent exec will not have LALA set/
2015-08-28 13:36:42 -04:00
testRequires ( c , DaemonIsLinux )
2016-01-28 21:22:24 -05:00
runSleepingContainer ( c , "-e" , "LALA=value1" , "-e" , "LALA=value2" , "-d" , "--name" , "testing" )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , waitRun ( "testing" ) )
2014-11-14 12:37:04 -05:00
2015-07-20 02:55:40 -04:00
out , _ := dockerCmd ( c , "exec" , "testing" , "env" )
2019-04-04 09:23:19 -04:00
assert . Check ( c , ! strings . Contains ( out , "LALA=value1" ) )
assert . Check ( c , strings . Contains ( out , "LALA=value2" ) )
assert . Check ( c , strings . Contains ( out , "HOME=/root" ) )
2014-11-14 12:37:04 -05:00
}
2014-11-17 18:50:09 -05:00
2016-07-13 13:24:41 -04:00
func ( s * DockerSuite ) TestExecSetEnv ( c * check . C ) {
testRequires ( c , DaemonIsLinux )
runSleepingContainer ( c , "-e" , "HOME=/root" , "-d" , "--name" , "testing" )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , waitRun ( "testing" ) )
2016-07-13 13:24:41 -04:00
out , _ := dockerCmd ( c , "exec" , "-e" , "HOME=/another" , "-e" , "ABC=xyz" , "testing" , "env" )
2019-04-04 09:23:19 -04:00
assert . Check ( c , ! strings . Contains ( out , "HOME=/root" ) )
assert . Check ( c , strings . Contains ( out , "HOME=/another" ) )
assert . Check ( c , strings . Contains ( out , "ABC=xyz" ) )
2016-07-13 13:24:41 -04:00
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestExecExitStatus ( c * check . C ) {
2016-01-28 21:22:24 -05:00
runSleepingContainer ( c , "-d" , "--name" , "top" )
2014-11-17 18:50:09 -05:00
2016-08-04 12:57:34 -04:00
result := icmd . RunCommand ( dockerBinary , "exec" , "top" , "sh" , "-c" , "exit 23" )
2017-08-23 17:01:29 -04:00
result . Assert ( c , icmd . Expected { ExitCode : 23 , Error : "exit status 23" } )
2014-11-17 18:50:09 -05:00
}
2014-11-27 11:08:39 -05:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestExecPausedContainer ( c * check . C ) {
2016-09-08 20:31:04 -04:00
testRequires ( c , IsPausable )
2014-11-27 11:08:39 -05:00
2017-04-16 17:39:30 -04:00
out := runSleepingContainer ( c , "-d" , "--name" , "testing" )
2015-04-06 09:21:18 -04:00
ContainerID := strings . TrimSpace ( out )
2014-11-27 11:08:39 -05:00
2015-07-20 02:55:40 -04:00
dockerCmd ( c , "pause" , "testing" )
2017-05-10 11:14:11 -04:00
out , _ , err := dockerCmdWithError ( "exec" , ContainerID , "echo" , "hello" )
2019-04-04 09:23:19 -04:00
assert . ErrorContains ( c , err , "" , "container should fail to exec new command if it is paused" )
2014-11-27 11:08:39 -05:00
expected := ContainerID + " is paused, unpause the container before exec"
2019-04-04 09:23:19 -04:00
assert . Assert ( c , is . Contains ( out , expected ) , "container should not exec new command if it is paused" )
2014-11-27 11:08:39 -05:00
}
2014-12-03 20:27:39 -05:00
// regression test for #9476
2016-01-24 03:32:52 -05:00
func ( s * DockerSuite ) TestExecTTYCloseStdin ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// TODO Windows CI: This requires some work to port to Windows.
2015-08-28 13:36:42 -04:00
testRequires ( c , DaemonIsLinux )
2015-07-20 02:55:40 -04:00
dockerCmd ( c , "run" , "-d" , "-it" , "--name" , "exec_tty_stdin" , "busybox" )
2014-12-03 20:27:39 -05:00
2015-07-20 02:55:40 -04:00
cmd := exec . Command ( dockerBinary , "exec" , "-i" , "exec_tty_stdin" , "cat" )
2014-12-03 20:27:39 -05:00
stdinRw , err := cmd . StdinPipe ( )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2014-12-03 20:27:39 -05:00
stdinRw . Write ( [ ] byte ( "test" ) )
stdinRw . Close ( )
2015-10-21 19:58:19 -04:00
out , _ , err := runCommandWithOutput ( cmd )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err , out )
2014-12-03 20:27:39 -05:00
2015-10-21 19:58:19 -04:00
out , _ = dockerCmd ( c , "top" , "exec_tty_stdin" )
2014-12-03 20:27:39 -05:00
outArr := strings . Split ( out , "\n" )
2019-04-04 09:23:19 -04:00
assert . Assert ( c , len ( outArr ) <= 3 , "exec process left running" )
assert . Assert ( c , ! strings . Contains ( out , "nsenter-exec" ) )
2014-12-03 20:27:39 -05:00
}
2014-12-05 19:50:56 -05:00
2016-01-24 03:32:52 -05:00
func ( s * DockerSuite ) TestExecTTYWithoutStdin ( c * check . C ) {
2015-07-20 02:55:40 -04:00
out , _ := dockerCmd ( c , "run" , "-d" , "-ti" , "busybox" )
2014-12-05 19:50:56 -05:00
id := strings . TrimSpace ( out )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , waitRun ( id ) )
2014-12-05 19:50:56 -05:00
2015-04-27 13:29:48 -04:00
errChan := make ( chan error )
2014-12-05 19:50:56 -05:00
go func ( ) {
2015-04-27 13:29:48 -04:00
defer close ( errChan )
2014-12-05 19:50:56 -05:00
cmd := exec . Command ( dockerBinary , "exec" , "-ti" , id , "true" )
if _ , err := cmd . StdinPipe ( ) ; err != nil {
2015-04-27 13:29:48 -04:00
errChan <- err
return
2014-12-05 19:50:56 -05:00
}
2016-05-25 13:19:17 -04:00
expected := "the input device is not a TTY"
if runtime . GOOS == "windows" {
expected += ". If you are using mintty, try prefixing the command with 'winpty'"
}
2014-12-05 19:50:56 -05:00
if out , _ , err := runCommandWithOutput ( cmd ) ; err == nil {
2015-04-27 13:29:48 -04:00
errChan <- fmt . Errorf ( "exec should have failed" )
return
2014-12-05 19:50:56 -05:00
} else if ! strings . Contains ( out , expected ) {
2015-04-27 13:29:48 -04:00
errChan <- fmt . Errorf ( "exec failed with error %q: expected %q" , out , expected )
return
2014-12-05 19:50:56 -05:00
}
} ( )
select {
2015-04-27 13:29:48 -04:00
case err := <- errChan :
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2014-12-05 19:50:56 -05:00
case <- time . After ( 3 * time . Second ) :
2015-04-18 12:46:47 -04:00
c . Fatal ( "exec is running but should have failed" )
2014-12-05 19:50:56 -05:00
}
}
2014-12-23 14:16:23 -05:00
2016-12-13 15:21:51 -05:00
// FIXME(vdemeester) this should be a unit tests on cli/command/container package
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestExecParseError ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// TODO Windows CI: Requires some extra work. Consider copying the
// runSleepingContainer helper to have an exec version.
2015-08-28 13:36:42 -04:00
testRequires ( c , DaemonIsLinux )
2015-07-20 02:55:40 -04:00
dockerCmd ( c , "run" , "-d" , "--name" , "top" , "busybox" , "top" )
2014-12-23 14:16:23 -05:00
// Test normal (non-detached) case first
2016-12-13 15:21:51 -05:00
icmd . RunCommand ( dockerBinary , "exec" , "top" ) . Assert ( c , icmd . Expected {
ExitCode : 1 ,
Error : "exit status 1" ,
Err : "See 'docker exec --help'" ,
} )
2014-12-23 14:16:23 -05:00
}
2014-12-26 20:19:23 -05:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestExecStopNotHanging ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// TODO Windows CI: Requires some extra work. Consider copying the
// runSleepingContainer helper to have an exec version.
2015-08-28 13:36:42 -04:00
testRequires ( c , DaemonIsLinux )
2015-07-20 02:55:40 -04:00
dockerCmd ( c , "run" , "-d" , "--name" , "testing" , "busybox" , "top" )
2014-12-26 20:19:23 -05:00
2017-09-07 13:11:25 -04:00
result := icmd . StartCmd ( icmd . Command ( dockerBinary , "exec" , "testing" , "top" ) )
result . Assert ( c , icmd . Success )
go icmd . WaitOnCmd ( 0 , result )
2014-12-26 20:19:23 -05:00
2015-04-27 13:29:48 -04:00
type dstop struct {
2017-09-07 13:11:25 -04:00
out string
2015-04-27 13:29:48 -04:00
err error
}
ch := make ( chan dstop )
2014-12-26 20:19:23 -05:00
go func ( ) {
2017-09-07 13:11:25 -04:00
result := icmd . RunCommand ( dockerBinary , "stop" , "testing" )
ch <- dstop { result . Combined ( ) , result . Error }
2015-04-27 13:29:48 -04:00
close ( ch )
2014-12-26 20:19:23 -05:00
} ( )
select {
case <- time . After ( 3 * time . Second ) :
2015-04-18 12:46:47 -04:00
c . Fatal ( "Container stop timed out" )
2015-04-27 13:29:48 -04:00
case s := <- ch :
2019-04-04 09:23:19 -04:00
assert . NilError ( c , s . err )
2014-12-26 20:19:23 -05:00
}
}
2015-01-15 13:37:30 -05:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestExecCgroup ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// Not applicable on Windows - using Linux specific functionality
2015-09-18 13:41:12 -04:00
testRequires ( c , NotUserNamespace )
2015-08-28 13:36:42 -04:00
testRequires ( c , DaemonIsLinux )
2015-07-20 02:55:40 -04:00
dockerCmd ( c , "run" , "-d" , "--name" , "testing" , "busybox" , "top" )
2015-01-15 13:37:30 -05:00
2015-07-20 02:55:40 -04:00
out , _ := dockerCmd ( c , "exec" , "testing" , "cat" , "/proc/1/cgroup" )
containerCgroups := sort . StringSlice ( strings . Split ( out , "\n" ) )
2015-01-15 13:37:30 -05:00
var wg sync . WaitGroup
2015-04-18 12:46:47 -04:00
var mu sync . Mutex
2018-05-19 07:38:54 -04:00
var execCgroups [ ] sort . StringSlice
2015-04-27 13:29:48 -04:00
errChan := make ( chan error )
2015-01-15 13:37:30 -05:00
// exec a few times concurrently to get consistent failure
for i := 0 ; i < 5 ; i ++ {
wg . Add ( 1 )
go func ( ) {
2015-07-27 14:13:25 -04:00
out , _ , err := dockerCmdWithError ( "exec" , "testing" , "cat" , "/proc/self/cgroup" )
2015-01-15 13:37:30 -05:00
if err != nil {
2015-04-27 13:29:48 -04:00
errChan <- err
return
2015-01-15 13:37:30 -05:00
}
2015-07-20 02:55:40 -04:00
cg := sort . StringSlice ( strings . Split ( out , "\n" ) )
2015-01-15 13:37:30 -05:00
2015-04-18 12:46:47 -04:00
mu . Lock ( )
2015-01-15 13:37:30 -05:00
execCgroups = append ( execCgroups , cg )
2015-04-18 12:46:47 -04:00
mu . Unlock ( )
2015-01-15 13:37:30 -05:00
wg . Done ( )
} ( )
}
wg . Wait ( )
2015-04-27 13:29:48 -04:00
close ( errChan )
for err := range errChan {
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2015-04-27 13:29:48 -04:00
}
2015-01-15 13:37:30 -05:00
for _ , cg := range execCgroups {
if ! reflect . DeepEqual ( cg , containerCgroups ) {
fmt . Println ( "exec cgroups:" )
for _ , name := range cg {
fmt . Printf ( " %s\n" , name )
}
fmt . Println ( "container cgroups:" )
for _ , name := range containerCgroups {
fmt . Printf ( " %s\n" , name )
}
2015-04-18 12:46:47 -04:00
c . Fatal ( "cgroups mismatched" )
2015-01-15 13:37:30 -05:00
}
}
}
2014-12-30 17:05:00 -05:00
2016-01-28 21:22:24 -05:00
func ( s * DockerSuite ) TestExecInspectID ( c * check . C ) {
2017-04-16 17:39:30 -04:00
out := runSleepingContainer ( c , "-d" )
2014-12-30 17:05:00 -05:00
id := strings . TrimSuffix ( out , "\n" )
2016-01-28 09:19:25 -05:00
out = inspectField ( c , id , "ExecIDs" )
2019-04-04 09:23:19 -04:00
assert . Equal ( c , out , "[]" , "ExecIDs should be empty, got: %s" , out )
2014-12-30 17:05:00 -05:00
2015-08-04 07:08:30 -04:00
// Start an exec, have it block waiting so we can do some checking
cmd := exec . Command ( dockerBinary , "exec" , id , "sh" , "-c" ,
2016-01-28 21:22:24 -05:00
"while ! test -e /execid1; do sleep 1; done" )
2015-07-09 23:57:03 -04:00
2016-01-28 09:19:25 -05:00
err := cmd . Start ( )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err , "failed to start the exec cmd" )
2015-07-09 23:57:03 -04:00
// Give the exec 10 chances/seconds to start then give up and stop the test
tries := 10
for i := 0 ; i < tries ; i ++ {
2015-07-17 20:30:24 -04:00
// Since its still running we should see exec as part of the container
2016-03-08 12:51:39 -05:00
out = strings . TrimSpace ( inspectField ( c , id , "ExecIDs" ) )
2015-07-17 20:30:24 -04:00
2015-07-09 23:57:03 -04:00
if out != "[]" && out != "<no value>" {
break
}
2019-04-04 09:23:19 -04:00
assert . Check ( c , i + 1 != tries , "ExecIDs still empty after 10 second" )
2015-07-09 23:57:03 -04:00
time . Sleep ( 1 * time . Second )
}
// Save execID for later
execID , err := inspectFilter ( id , "index .ExecIDs 0" )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err , "failed to get the exec id" )
2014-12-30 17:05:00 -05:00
2015-08-04 07:08:30 -04:00
// End the exec by creating the missing file
2019-04-04 09:23:19 -04:00
err = exec . Command ( dockerBinary , "exec" , id , "sh" , "-c" , "touch /execid1" ) . Run ( )
assert . NilError ( c , err , "failed to run the 2nd exec cmd" )
2015-08-04 07:08:30 -04:00
// Wait for 1st exec to complete
2015-07-09 23:57:03 -04:00
cmd . Wait ( )
2016-03-08 12:51:39 -05:00
// Give the exec 10 chances/seconds to stop then give up and stop the test
for i := 0 ; i < tries ; i ++ {
// Since its still running we should see exec as part of the container
out = strings . TrimSpace ( inspectField ( c , id , "ExecIDs" ) )
2014-12-30 17:05:00 -05:00
2016-03-08 12:51:39 -05:00
if out == "[]" {
break
}
2019-04-04 09:23:19 -04:00
assert . Check ( c , i + 1 != tries , "ExecIDs still empty after 10 second" )
2016-03-08 12:51:39 -05:00
time . Sleep ( 1 * time . Second )
}
2015-07-09 23:57:03 -04:00
// But we should still be able to query the execID
2019-01-03 16:49:00 -05:00
cli , err := client . NewClientWithOpts ( client . FromEnv )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2017-05-23 23:56:26 -04:00
defer cli . Close ( )
2017-01-28 14:08:30 -05:00
2017-05-23 23:56:26 -04:00
_ , err = cli . ContainerExecInspect ( context . Background ( ) , execID )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2015-07-09 22:39:57 -04:00
// Now delete the container and then an 'inspect' on the exec should
// result in a 404 (not 'container not running')
out , ec := dockerCmd ( c , "rm" , "-f" , id )
2019-04-04 09:23:19 -04:00
assert . Equal ( c , ec , 0 , "error removing container: %s" , out )
2017-05-23 23:56:26 -04:00
_ , err = cli . ContainerExecInspect ( context . Background ( ) , execID )
2019-04-04 09:23:19 -04:00
assert . ErrorContains ( c , err , "No such exec instance" )
2014-12-30 17:05:00 -05:00
}
2015-01-19 15:11:19 -05:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestLinksPingLinkedContainersOnRename ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// Problematic on Windows as Windows does not support links
2015-08-28 13:36:42 -04:00
testRequires ( c , DaemonIsLinux )
2015-01-19 15:11:19 -05:00
var out string
2015-04-18 12:46:47 -04:00
out , _ = dockerCmd ( c , "run" , "-d" , "--name" , "container1" , "busybox" , "top" )
2015-04-06 09:21:18 -04:00
idA := strings . TrimSpace ( out )
2019-04-04 09:23:19 -04:00
assert . Assert ( c , idA != "" , "%s, id should not be nil" , out )
2015-04-18 12:46:47 -04:00
out , _ = dockerCmd ( c , "run" , "-d" , "--link" , "container1:alias1" , "--name" , "container2" , "busybox" , "top" )
2015-04-06 09:21:18 -04:00
idB := strings . TrimSpace ( out )
2019-04-04 09:23:19 -04:00
assert . Assert ( c , idB != "" , "%s, id should not be nil" , out )
2015-01-19 15:11:19 -05:00
2015-07-20 02:55:40 -04:00
dockerCmd ( c , "exec" , "container2" , "ping" , "-c" , "1" , "alias1" , "-W" , "1" )
2015-04-18 12:46:47 -04:00
dockerCmd ( c , "rename" , "container1" , "container_new" )
2015-07-20 02:55:40 -04:00
dockerCmd ( c , "exec" , "container2" , "ping" , "-c" , "1" , "alias1" , "-W" , "1" )
2015-01-19 15:11:19 -05:00
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestRunMutableNetworkFiles ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// Not applicable on Windows to Windows CI.
2018-12-24 07:25:53 -05:00
testRequires ( c , testEnv . IsLocalDaemon , DaemonIsLinux )
2015-01-26 20:17:08 -05:00
for _ , fn := range [ ] string { "resolv.conf" , "hosts" } {
2017-04-11 13:42:54 -04:00
containers := cli . DockerCmd ( c , "ps" , "-q" , "-a" ) . Combined ( )
if containers != "" {
cli . DockerCmd ( c , append ( [ ] string { "rm" , "-fv" } , strings . Split ( strings . TrimSpace ( containers ) , "\n" ) ... ) ... )
}
2015-01-26 20:17:08 -05:00
2017-01-16 10:39:12 -05:00
content := runCommandAndReadContainerFile ( c , fn , dockerBinary , "run" , "-d" , "--name" , "c1" , "busybox" , "sh" , "-c" , fmt . Sprintf ( "echo success >/etc/%s && top" , fn ) )
2015-01-26 20:17:08 -05:00
2019-04-04 09:23:19 -04:00
assert . Equal ( c , strings . TrimSpace ( string ( content ) ) , "success" , "Content was not what was modified in the container" , string ( content ) )
2015-01-26 20:17:08 -05:00
2015-07-20 02:55:40 -04:00
out , _ := dockerCmd ( c , "run" , "-d" , "--name" , "c2" , "busybox" , "top" )
2015-01-26 20:17:08 -05:00
contID := strings . TrimSpace ( out )
netFilePath := containerStorageFile ( contID , fn )
f , err := os . OpenFile ( netFilePath , os . O_WRONLY | os . O_SYNC | os . O_APPEND , 0644 )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2015-01-26 20:17:08 -05:00
if _ , err := f . Seek ( 0 , 0 ) ; err != nil {
f . Close ( )
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-01-26 20:17:08 -05:00
}
if err := f . Truncate ( 0 ) ; err != nil {
f . Close ( )
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-01-26 20:17:08 -05:00
}
if _ , err := f . Write ( [ ] byte ( "success2\n" ) ) ; err != nil {
f . Close ( )
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-01-26 20:17:08 -05:00
}
f . Close ( )
2015-07-20 02:55:40 -04:00
res , _ := dockerCmd ( c , "exec" , contID , "cat" , "/etc/" + fn )
2019-04-04 09:23:19 -04:00
assert . Equal ( c , res , "success2\n" )
2015-01-26 20:17:08 -05:00
}
}
2015-04-10 23:04:24 -04:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestExecWithUser ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// TODO Windows CI: This may be fixable in the future once Windows
// supports users
2015-08-28 13:36:42 -04:00
testRequires ( c , DaemonIsLinux )
2015-07-20 02:55:40 -04:00
dockerCmd ( c , "run" , "-d" , "--name" , "parent" , "busybox" , "top" )
2015-04-10 23:04:24 -04:00
2015-07-20 02:55:40 -04:00
out , _ := dockerCmd ( c , "exec" , "-u" , "1" , "parent" , "id" )
2019-04-04 09:23:19 -04:00
assert . Assert ( c , strings . Contains ( out , "uid=1(daemon) gid=1(daemon)" ) )
2015-04-10 23:04:24 -04:00
2015-07-20 02:55:40 -04:00
out , _ = dockerCmd ( c , "exec" , "-u" , "root" , "parent" , "id" )
2019-04-04 09:23:19 -04:00
assert . Assert ( c , strings . Contains ( out , "uid=0(root) gid=0(root)" ) , "exec with user by id expected daemon user got %s" , out )
2015-04-10 23:04:24 -04:00
}
2015-06-26 18:06:37 -04:00
2015-06-19 02:01:50 -04:00
func ( s * DockerSuite ) TestExecWithPrivileged ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// Not applicable on Windows
2015-09-18 13:41:12 -04:00
testRequires ( c , DaemonIsLinux , NotUserNamespace )
2015-06-21 23:06:07 -04:00
// Start main loop which attempts mknod repeatedly
dockerCmd ( c , "run" , "-d" , "--name" , "parent" , "--cap-drop=ALL" , "busybox" , "sh" , "-c" , ` while (true); do if [ -e /exec_priv ]; then cat /exec_priv && mknod /tmp/sda b 8 0 && echo "Success"; else echo "Privileged exec has not run yet"; fi; usleep 10000; done ` )
2015-06-19 02:01:50 -04:00
2015-06-21 23:06:07 -04:00
// Check exec mknod doesn't work
2017-01-16 10:39:12 -05:00
icmd . RunCommand ( dockerBinary , "exec" , "parent" , "sh" , "-c" , "mknod /tmp/sdb b 8 16" ) . Assert ( c , icmd . Expected {
ExitCode : 1 ,
Err : "Operation not permitted" ,
} )
2015-06-19 02:01:50 -04:00
2015-06-21 23:06:07 -04:00
// Check exec mknod does work with --privileged
2017-01-16 10:39:12 -05:00
result := icmd . RunCommand ( dockerBinary , "exec" , "--privileged" , "parent" , "sh" , "-c" , ` echo "Running exec --privileged" > /exec_priv && mknod /tmp/sdb b 8 16 && usleep 50000 && echo "Finished exec --privileged" > /exec_priv && echo ok ` )
result . Assert ( c , icmd . Success )
2015-06-19 02:01:50 -04:00
2017-01-16 10:39:12 -05:00
actual := strings . TrimSpace ( result . Combined ( ) )
2019-04-04 09:23:19 -04:00
assert . Equal ( c , actual , "ok" , "exec mknod in --cap-drop=ALL container with --privileged failed, output: %q" , result . Combined ( ) )
2015-06-19 02:01:50 -04:00
2015-06-21 23:06:07 -04:00
// Check subsequent unprivileged exec cannot mknod
2017-01-16 10:39:12 -05:00
icmd . RunCommand ( dockerBinary , "exec" , "parent" , "sh" , "-c" , "mknod /tmp/sdc b 8 32" ) . Assert ( c , icmd . Expected {
ExitCode : 1 ,
Err : "Operation not permitted" ,
} )
2015-06-21 23:06:07 -04:00
// Confirm at no point was mknod allowed
2017-01-16 10:39:12 -05:00
result = icmd . RunCommand ( dockerBinary , "logs" , "parent" )
result . Assert ( c , icmd . Success )
2019-04-04 09:23:19 -04:00
assert . Assert ( c , ! strings . Contains ( result . Combined ( ) , "Success" ) )
2015-06-19 02:01:50 -04:00
}
2015-06-26 18:06:37 -04:00
func ( s * DockerSuite ) TestExecWithImageUser ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// Not applicable on Windows
2015-08-28 13:36:42 -04:00
testRequires ( c , DaemonIsLinux )
2015-06-26 18:06:37 -04:00
name := "testbuilduser"
2017-03-23 13:35:22 -04:00
buildImageSuccessfully ( c , name , build . WithDockerfile ( ` FROM busybox
2015-06-26 18:06:37 -04:00
RUN echo ' dockerio : x : 1001 : 1001 : : / bin : / bin / false ' >> / etc / passwd
2017-01-16 05:30:14 -05:00
USER dockerio ` ) )
2015-06-26 18:06:37 -04:00
dockerCmd ( c , "run" , "-d" , "--name" , "dockerioexec" , name , "top" )
out , _ := dockerCmd ( c , "exec" , "dockerioexec" , "whoami" )
2019-04-04 09:23:19 -04:00
assert . Assert ( c , strings . Contains ( out , "dockerio" ) , "exec with user by id expected dockerio user got %s" , out )
2015-06-26 18:06:37 -04:00
}
2015-07-30 13:26:45 -04:00
func ( s * DockerSuite ) TestExecOnReadonlyContainer ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// Windows does not support read-only
2015-09-18 13:41:12 -04:00
// --read-only + userns has remount issues
testRequires ( c , DaemonIsLinux , NotUserNamespace )
2015-07-30 13:26:45 -04:00
dockerCmd ( c , "run" , "-d" , "--read-only" , "--name" , "parent" , "busybox" , "top" )
2015-10-21 19:58:19 -04:00
dockerCmd ( c , "exec" , "parent" , "true" )
2015-07-30 13:26:45 -04:00
}
2015-08-21 08:39:26 -04:00
2016-03-23 22:54:32 -04:00
func ( s * DockerSuite ) TestExecUlimits ( c * check . C ) {
testRequires ( c , DaemonIsLinux )
name := "testexeculimits"
2017-03-23 07:31:28 -04:00
runSleepingContainer ( c , "-d" , "--ulimit" , "nofile=511:511" , "--name" , name )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , waitRun ( name ) )
2016-03-23 22:54:32 -04:00
2017-03-23 07:31:28 -04:00
out , _ , err := dockerCmdWithError ( "exec" , name , "sh" , "-c" , "ulimit -n" )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
assert . Equal ( c , strings . TrimSpace ( out ) , "511" )
2016-03-23 22:54:32 -04:00
}
2015-08-21 08:39:26 -04:00
// #15750
func ( s * DockerSuite ) TestExecStartFails ( c * check . C ) {
2016-01-28 21:22:24 -05:00
// TODO Windows CI. This test should be portable. Figure out why it fails
// currently.
2015-10-08 16:58:27 -04:00
testRequires ( c , DaemonIsLinux )
2015-08-21 08:39:26 -04:00
name := "exec-15750"
2016-01-28 21:22:24 -05:00
runSleepingContainer ( c , "-d" , "--name" , name )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , waitRun ( name ) )
2015-08-21 08:39:26 -04:00
2015-09-28 22:09:04 -04:00
out , _ , err := dockerCmdWithError ( "exec" , name , "no-such-cmd" )
2019-04-04 09:23:19 -04:00
assert . ErrorContains ( c , err , "" , out )
assert . Assert ( c , strings . Contains ( out , "executable file not found" ) )
2015-08-21 08:39:26 -04:00
}
2016-09-28 16:34:47 -04:00
// Fix regression in https://github.com/docker/docker/pull/26461#issuecomment-250287297
func ( s * DockerSuite ) TestExecWindowsPathNotWiped ( c * check . C ) {
testRequires ( c , DaemonIsWindows )
out , _ := dockerCmd ( c , "run" , "-d" , "--name" , "testing" , minimalBaseImage ( ) , "powershell" , "start-sleep" , "60" )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , waitRun ( strings . TrimSpace ( out ) ) )
2016-09-28 16:34:47 -04:00
out , _ = dockerCmd ( c , "exec" , "testing" , "powershell" , "write-host" , "$env:PATH" )
out = strings . ToLower ( strings . Trim ( out , "\r\n" ) )
2019-04-04 09:23:19 -04:00
assert . Assert ( c , strings . Contains ( out , ` windowspowershell\v1.0 ` ) )
2016-09-28 16:34:47 -04:00
}
2016-09-28 18:21:33 -04:00
func ( s * DockerSuite ) TestExecEnvLinksHost ( c * check . C ) {
testRequires ( c , DaemonIsLinux )
runSleepingContainer ( c , "-d" , "--name" , "foo" )
runSleepingContainer ( c , "-d" , "--link" , "foo:db" , "--hostname" , "myhost" , "--name" , "bar" )
out , _ := dockerCmd ( c , "exec" , "bar" , "env" )
2019-04-04 09:23:19 -04:00
assert . Check ( c , is . Contains ( out , "HOSTNAME=myhost" ) )
assert . Check ( c , is . Contains ( out , "DB_NAME=/bar/db" ) )
2016-09-28 18:21:33 -04:00
}
2016-10-12 19:56:52 -04:00
func ( s * DockerSuite ) TestExecWindowsOpenHandles ( c * check . C ) {
testRequires ( c , DaemonIsWindows )
2018-08-20 22:05:46 -04:00
if runtime . GOOS == "windows" {
v , err := kernel . GetKernelVersion ( )
2019-04-04 09:23:19 -04:00
assert . NilError ( c , err )
2018-08-20 22:05:46 -04:00
build , _ := strconv . Atoi ( strings . Split ( strings . SplitN ( v . String ( ) , " " , 3 ) [ 2 ] [ 1 : ] , "." ) [ 0 ] )
if build >= 17743 {
c . Skip ( "Temporarily disabled on RS5 17743+ builds due to platform bug" )
// This is being tracked internally. @jhowardmsft. Summary of failure
// from an email in early July 2018 below:
//
// Platform regression. In cmd.exe by the look of it. I can repro
// it outside of CI. It fails the same on 17681, 17676 and even as
// far back as 17663, over a month old. From investigating, I can see
// what's happening in the container, but not the reason. The test
// starts a long-running container based on the Windows busybox image.
// It then adds another process (docker exec) to that container to
// sleep. It loops waiting for two instances of busybox.exe running,
// and cmd.exe to quit. What's actually happening is that the second
// exec hangs indefinitely, and from docker top, I can see
// "OpenWith.exe" running.
//Manual repro would be
//# Start the first long-running container
//docker run --rm -d --name test busybox sleep 300
//# In another window, docker top test. There should be a single instance of busybox.exe running
//# In a third window, docker exec test cmd /c start sleep 10 NOTE THIS HANGS UNTIL 5 MIN TIMEOUT
//# In the second window, run docker top test. Note that OpenWith.exe is running, one cmd.exe and only one busybox. I would expect no "OpenWith" and two busybox.exe's.
}
}
2016-10-12 19:56:52 -04:00
runSleepingContainer ( c , "-d" , "--name" , "test" )
exec := make ( chan bool )
go func ( ) {
dockerCmd ( c , "exec" , "test" , "cmd" , "/c" , "start sleep 10" )
exec <- true
} ( )
2017-02-06 21:53:28 -05:00
count := 0
2016-10-12 19:56:52 -04:00
for {
top := make ( chan string )
var out string
go func ( ) {
out , _ := dockerCmd ( c , "top" , "test" )
top <- out
} ( )
select {
case <- time . After ( time . Second * 5 ) :
2017-02-06 21:53:28 -05:00
c . Fatal ( "timed out waiting for top while exec is exiting" )
2016-10-12 19:56:52 -04:00
case out = <- top :
break
}
if strings . Count ( out , "busybox.exe" ) == 2 && ! strings . Contains ( out , "cmd.exe" ) {
// The initial exec process (cmd.exe) has exited, and both sleeps are currently running
break
}
2017-02-06 21:53:28 -05:00
count ++
if count >= 30 {
c . Fatal ( "too many retries" )
}
2016-10-12 19:56:52 -04:00
time . Sleep ( 1 * time . Second )
}
inspect := make ( chan bool )
go func ( ) {
dockerCmd ( c , "inspect" , "test" )
inspect <- true
} ( )
select {
case <- time . After ( time . Second * 5 ) :
2017-02-06 21:53:28 -05:00
c . Fatal ( "timed out waiting for inspect while exec is exiting" )
2016-10-12 19:56:52 -04:00
case <- inspect :
break
}
// Ensure the background sleep is still running
out , _ := dockerCmd ( c , "top" , "test" )
2019-04-04 09:23:19 -04:00
assert . Equal ( c , strings . Count ( out , "busybox.exe" ) , 2 )
2016-10-12 19:56:52 -04:00
// The exec should exit when the background sleep exits
select {
case <- time . After ( time . Second * 15 ) :
2017-02-06 21:53:28 -05:00
c . Fatal ( "timed out waiting for async exec to exit" )
2016-10-12 19:56:52 -04:00
case <- exec :
// Ensure the background sleep has actually exited
out , _ := dockerCmd ( c , "top" , "test" )
2019-04-04 09:23:19 -04:00
assert . Equal ( c , strings . Count ( out , "busybox.exe" ) , 1 )
2016-10-12 19:56:52 -04:00
break
}
}